Static task
static1
General
-
Target
056c4fa34f2ee270b423bc1dda161473
-
Size
36KB
-
MD5
056c4fa34f2ee270b423bc1dda161473
-
SHA1
4452498ddb2c7d429c1e6d53e7d3136faba946b7
-
SHA256
23eb487656e25ee5d9de5643dda9167d066922cf1627f5330b5d7b0bcac55f03
-
SHA512
20296f8f8321a8eac46d1167806ab6d697bf36fce1a677fa59f5fabb55f1e45a29adec8153fb1c97e5247e85f62100effbcedbab9486a889082efa9c89de07d7
-
SSDEEP
768:w9Dj4UbO/Iwd+054Ga52i4gJTrR+vxhgUK6/KzgqU8wXRXmT3sFz:Wn4UbOZd/452i4glrR+vgUK6yzgR1XRr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 056c4fa34f2ee270b423bc1dda161473
Files
-
056c4fa34f2ee270b423bc1dda161473.sys windows:4 windows x86 arch:x86
3aee2a94ba4e6e18558855358b35d379
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
isdigit
ZwClose
swprintf
isprint
tolower
ZwCreateFile
RtlInitUnicodeString
IoRegisterDriverReinitialization
isspace
strchr
atol
strrchr
strstr
isupper
atoi
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
PsGetVersion
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
RtlAnsiStringToUnicodeString
_wcslwr
wcsncpy
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
MmIsAddressValid
ZwUnmapViewOfSection
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
ZwCreateKey
wcscat
wcscpy
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ